Usted se encuentra revisando un registro bibliográfico de la BDU Para conocer mas sobre la Base de Datos Unificada haga click en el ícono del home

Titulos:
Applied cryptography: protocols, algorithms, and source code in C / Bruce Schneier
Idiomas:
eng
ISBN:
0471117099
Lugar de Edición:
New York:
Editor:
Wiley,
Fecha de Edición:
1996
Notas #:
UN EJEMPLAR PRESTAMO PERMENENTE COMPUTOS
Notas Formateada:
1: Foundations -- Part 1: Cryptographic protocols - 2: Protocol building blocks - 3: Basic protocols - 4: Intermediate protocols - 5: Advanced protocols - 6: Esoteric protocols -- Part II: Cryptographic techniques - 7: Key lengthe - 8: Key management - 9: Algorithm types and modes - 10: Using algorithms -- Part III: Cryptographic algorithms - 11: Mathematical background - 12: Data encryption standard (DES) - 13: Other block ciphers - 14: Still other block ciphers - 15: Comininig block ciphers - 16. Pseudo-random-sequence generators and stream ciphers - 17: Other stream ciphers and real random-sequence generators - 18: One-way hash functions - 19: Public-key algorithms - 20: Public-key digital signature algorithms - 21: Identification schemes - 22: Key-exchange algorithms - 23: Special algorithms for protocols -- Part IV: The real world - 24: Example implementation - 25: Politics
Palabras clave:

Leader:
cam
Campo 003:
AR-BaIT
Campo 008:
270401s1996t |||||||||||||||||eng
Campo 020:
^a0471117099
Campo 040:
^aITBA^cITBA
Campo 041:
0 ^aeng
Campo 100:
1 ^aSchneier, Bruce^914257
Campo 245:
10^aApplied cryptography:^bprotocols, algorithms, and source code in C /^cBruce Schneier
Campo 246:
Campo 260:
^aNew York:^bWiley,^c1996
Campo 300:
^axxiii, 758 p.
Campo 500:
^aUN EJEMPLAR PRESTAMO PERMENENTE COMPUTOS
Campo 505:
0 ^a1: Foundations -- Part 1: Cryptographic protocols - 2: Protocol building blocks - 3: Basic protocols - 4: Intermediate protocols - 5: Advanced protocols - 6: Esoteric protocols -- Part II: Cryptographic techniques - 7: Key lengthe - 8: Key management - 9: Algorithm types and modes - 10: Using algorithms -- Part III: Cryptographic algorithms - 11: Mathematical background - 12: Data encryption standard (DES) - 13: Other block ciphers - 14: Still other block ciphers - 15: Comininig block ciphers - 16. Pseudo-random-sequence generators and stream ciphers - 17: Other stream ciphers and real random-sequence generators - 18: One-way hash functions - 19: Public-key algorithms - 20: Public-key digital signature algorithms - 21: Identification schemes - 22: Key-exchange algorithms - 23: Special algorithms for protocols -- Part IV: The real world - 24: Example implementation - 25: Politics
Proveniencia:
^aInstituto Tecnológico Buenos Aires (ITBA) - Biblioteca
Seleccionar y guardar el registro Haga click en el botón del carrito
Institucion:
Instituto Tecnológico Buenos Aires (ITBA)
Dependencia:
Biblioteca

Compartir este registro en Redes Sociales

Seleccionar y guardar el registro Haga click en el botón del carrito